Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://serve.tigogtm.top/puntos
Resource
win10v2004-20250314-en
General
-
Target
https://serve.tigogtm.top/puntos
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1200318399\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1200318399\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1843906094\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_metadata\verified_contents.json msedge.exe File created C:\Program Files\msedge_url_fetcher_5984_597123945\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1843906094\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1183487345\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_1200318399\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5984_2053752356\_locales\nl\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875689016024594" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1062200478-553497403-3857448183-1000\{14E63EF0-EE8B-410C-8008-22CCB6167F76} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5984 wrote to memory of 2628 5984 msedge.exe 86 PID 5984 wrote to memory of 2628 5984 msedge.exe 86 PID 5984 wrote to memory of 232 5984 msedge.exe 87 PID 5984 wrote to memory of 232 5984 msedge.exe 87 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 1732 5984 msedge.exe 88 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89 PID 5984 wrote to memory of 960 5984 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://serve.tigogtm.top/puntos1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b8,0x7ffa9750f208,0x7ffa9750f214,0x7ffa9750f2202⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:32⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1408,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3508,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3516,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5068,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5076,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5840,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5840,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5572,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6208,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5960,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4932,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5316,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6500,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,2784397278188205318,14223987203032384852,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD55e09661247665bacf52fbc3776ad396b
SHA1a4dbd1e75ad05801263faef38c4b19913d3bcb53
SHA2567379b9afa2a39e9df45b8eda786fbce023bc5322e2fff2107e0b0f089e614098
SHA5120abec21b66a0cf543bc69c8255eac54c867d88806243b16a82133d8d401b4ffb25dd9831262bc7e568f45f9f28f6bace55af162d5bd9ca126e3f12b1fea4048f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5248292fa65a9f40bcf24f529cfc29e7b
SHA1ade4a4146415dd702c2d1732d36a62b032919436
SHA256a21efb09150e377cc51d071ef970597f46610ede80a0433bbd5f30d58bd5b3b4
SHA512fc16355308168272851f7c8b86318ec2ba9591102338bf2131a01eceeec0bfc845715181e9c59a021f419b59ae2ffe76050f208f6fe7e92f88ced6ccbd941d8b
-
Filesize
16KB
MD595b8617a15a59d649ecf13b95dc0c5ab
SHA1aa631a3c569fdc52e5ecd0c65dc06a901799ce10
SHA25685b8e3a226e08d0cec7013b1a2cc73a3759d3a7705a3f1bdbb696c279fa1a3b3
SHA512ccb671e8a87d0de9f610f920ee8a5d769180e4dc1d93fc529fe19efecdec39133140d76740919f2dd34ba28841a7b070aba5e1ebca5056192a511283dbddb5fa
-
Filesize
36KB
MD57acd40c4868f48503e24a535f8abfa68
SHA1e70202c9e1ce716aa3ec4e95668c0fddc8c9e22e
SHA2564db6894b3710f87e6f8bc65329011e87de0565248d818b647edecf027dbcdaea
SHA51233050e87ea56b32869089c2ba922f588c4816d1c58bda576555788f6fb435561578a85079a13a1335e2a7cf37b5cd15d76aa195f610b26d37e55989858fcb5f0
-
Filesize
22KB
MD554480bad51e060b49138d6e039f95520
SHA101f6331ce3786478747f6c93e3c66cf410a294fb
SHA256f2cdd8f95df06b8fbc067f1678e53dfae32f5fc408b9fd858d85e316e678dffc
SHA5129901bf111fe755b5857b5804fbac10094976dac8adf662ab0bb995a305969f3add4e4b983321ea153fc045dbdc9204a2151db7c8cea32f092dc1783e44f2d463
-
Filesize
23KB
MD581b1d315f1ac95c7726c80ebb875c230
SHA1dd1293d0a612155084091931054af9dc09ae03a0
SHA2567512e57f3050724342023e74753884360484f215a8cd5730759147562204a5b6
SHA512a458d10018483fabb3cb2975eee632d9292d024ab0d4789e3d98768a026d66c9f9265a7f03bf10e81980995534bcab99b7b13832e055eacd79497a3fbe47266d
-
Filesize
467B
MD5370cd7528d8ebebb5a88e89d42520023
SHA1776e231ffc11108badf4701b6e794b7f82848a23
SHA25697ceebe4872bcafe3c8b4ba228158075d85d17b04b6e70703556a530df8f6fb5
SHA512413f6859a81d5c511723c50479c46063e9d418155d296e6a4f55632f8fba882d82168cf956b24319b3fdb21628749e6cb722cb26ef31efd13484f1f7234fe59b
-
Filesize
900B
MD546470fc89d758b628bf78d0128775284
SHA132a9069fc5f870d9912c34d468c9e72980382e5e
SHA256a24f7ef8ffc28b0b5386d580d0d97bee7c50c806ff31ab9b2dd3eab6fb0f42ea
SHA51273a4e00d6f943142e8f4316604c3743c8d2a9e21a47739c9b243c6d84bd47b46b1d9cb266b47d9f800bd7c5c69a90d1232942f0c46cfa8ee81fc88afef805d50
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD53092a6f2eb470d5310f23c742bad1ea4
SHA1a6d2df4b34b5b92e6fd2dc827c6cab05022c7c8c
SHA256b41c08aae45525ec1c5c4012845059910d154703cf9f053b7ff51e089420ea21
SHA5126beb161ee39b02a5c57b7c9eaaee69e886d5be5fcf1167607c6bd8cf72946428015805c975c362d3f647c9d0ef44767b16d7e6adc65f693f8cb3fedac5510998
-
Filesize
40KB
MD53fb3a03cd9bb03705c3c3d4f5615cecc
SHA17de245e709898aa621a3cab0dc84e5d756fc459e
SHA25663cb93d43530270cb74e8b7255ce7a1fc49498435432b271663de722bd3d484d
SHA5124ff50174bdedce033b3e9dc5b67f597163fe2f23c4f41dcf4b430f4ffb9f47bd71e3b98aae55224abbb0113b23a15e8e26db0ff7bb2fd5ffecf226b88be5ac9d
-
Filesize
54KB
MD5edd273ec64dc9d04cb41c0b820d6bbad
SHA1c0ed0006d75af42d1107f34eb75fe6ea607377d5
SHA256aaf80bf5d35151c7d5db2e875bf8ad10b84bac93f49936f6586025705c8afdec
SHA512e36a4b226a367b597388b0bc8b28c4daa500990c357351aa388ad4f615108b18cfd9a959da4edae042b6b43f8a52d3fa07af3de0beef3c80cd550d03756072a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD56084be89069ef8e78e614aad21b9dd7b
SHA1957730f162a88e17a49b85200a8868185d7553bc
SHA2567c458e160302406c4c675d7f329b93ca1a3c62ed59d14b933cbce324a0bb4260
SHA512d589aff42f35f96b6f466e108bed189a98f33029ce59d0f2fe2136f27d9bf8f6f177ff53300393c04957ec8e8fcbb130daf690218563ecada27690d6a8964795